header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

LibreNMS Collectd Command Injection

This module exploits a command injection vulnerability in the Collectd graphing functionality in LibreNMS. The `to` and `from` parameters used to define the range for a graph are sanitized using the `mysqli_escape_real_string()` function, which permits backticks. These parameters are used as part of a shell command that gets executed via the `passthru()` function, which can result in code execution.

PHP Real Estate SQL Injection Vulnerability

The vulnerability allows an attacker to pull admin info from the database. The exploit uses UNION SELECT statement to retrieve the username and password from the admin table. The vulnerable page is fullnews.php and the payload is www.site.com/fullnews.php?id=-1/**/UNION/**/ALL/**/SELECT/**/1,2,concat(username,char(58),password),4,5/**/FROM/**/admin/*

Form tools 1.5.0b Remote File Include

The vulnerability exists in the admin_page_open.php and client_page_open.php files in the Form Tools 1.5.0b software. The vulnerability allows an attacker to include remote files by manipulating the 'g_root_dir' parameter. By exploiting this vulnerability, an attacker can execute malicious code hosted on a remote server.

AwindInc SNMP Service Command Injection

This module exploits a vulnerability found in AwindInc and OEM'ed products where untrusted inputs are fed to ftpfw.sh system command, leading to command injection. A valid SNMP read-write community is required to exploit this vulnerability. The following devices are known to be affected by this issue: Crestron Airmedia AM-100 <= version 1.5.0.4, Crestron Airmedia AM-101 <= version 2.5.0.12, Awind WiPG-1600w <= version 2.0.1.8, Awind WiPG-2000d <= version 2.1.6.2, Barco wePresent 2000 <= version 2.1.5.7, Newline Trucast 2 <= version 2.1.0.5, Newline Trucast 3 <= version 2.1.3.7.

Multiple Remote File Inclusion in Oreon and Centreon

The vulnerability allows an attacker to include remote files in the vulnerable software. The vulnerable files in Oreon are './oreon-1.4/www/include/monitoring/engine/MakeXML.php' and './oreon-1.4/www/include/monitoring/engine/MakeXML4statusCounter.php'. The attack can be performed by appending a malicious URL to the vulnerable file. The exploit code is provided in the text.

Cisco RV110W/RV130(W)/RV215W Routers Management Interface Remote Command Execution

A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. RV110W Wireless-N VPN Firewall versions prior to 1.2.2.1 are affected. RV130W Wireless-N Multifunction VPN Router versions prior to 1.0.3.45 are affected. RV215W Wireless-N VPN Router versions prior to 1.3.1.1 are affected.

Cisco UCS Director default scpuser password

This module abuses a known default password on Cisco UCS Director. The 'scpuser' has the password of 'scpuser', and allows an attacker to login to the virtual appliance via SSH. This module has been tested with Cisco UCS Director virtual machines 6.6.0 and 6.7.0. Note that Cisco also mentions in their advisory that their IMC Supervisor and UCS Director Express are also affected by these vulnerabilities, but this module was not tested with those products.

ptrace Sudo Token Privilege Escalation

This module attempts to gain root privileges by blindly injecting into the session user's running shell processes and executing commands by calling `system()`, in the hope that the process has valid cached sudo tokens with root privileges. The system must have gdb installed and permit ptrace. This module has been tested successfully on Debian 9.8 (x64) and CentOS 7.4.1708 (x64).

Recent Exploits: